INFORMATION CHANGE THE WORLD

International Journal of Intelligent Systems and Applications(IJISA)

ISSN: 2074-904X (Print), ISSN: 2074-9058 (Online)

Published By: MECS Press

IJISA Vol.3, No.2, Mar. 2011

A High Performance Image Authentication Algorithm on GPU with CUDA

Full Text (PDF, 1067KB), PP.52-59


Views:148   Downloads:4

Author(s)

Caiwei Lin, Lei Zhao, Jiwen Yang

Index Terms

GPU;CUDA;image authentication;semi-fragile watermarking

Abstract

There has been large amounts of research on image authentication method. Many of the schemes perform well in verification results; however, most of them are time-consuming in traditional serial manners. And improving the efficiency of authentication process has become one of the challenges in image authentication field today. In the future, it’s a trend that authentication system with the properties of high performance, real-time, flexible and ease for development. In this paper, we present a CUDA-based implementation of an image authentication algorithm with NVIDIA’s Tesla C1060 GPU devices. Comparing with the original implementation on CPU, our CUDA-based implementation works 20x-50x faster with single GPU device. And experiment shows that, by using two GPUs, the performance gains can be further improved around 1.2 times in contras to single GPU.

Cite This Paper

Caiwei Lin, Lei Zhao, Jiwen Yang,"A High Performance Image Authentication Algorithm on GPU with CUDA", International Journal of Intelligent Systems and Applications(IJISA), vol.3, no.2, pp.52-59, 2011. DOI: 10.5815/ijisa.2011.02.08

Reference

[1]A. Haouzia and R. Noumeir, “Methods for image authentication: a survey,” Multimedia Tools Appl, pp. 1 – 46, 2008. 

[2]T. Chen, J. C. Wang, and Y. L. Zhou, “Combined digital signature and digital watermark scheme for image authentication,” International Conferences on Info-tech and Info-net, Vol. 5, pp. 78 – 82, 2001.

[3]C. K. Ho and C. T. Li, “Semi-fragile watermarking scheme for authentication of jpeg images,” In Information Technology: Coding and Computing, 2004, Proceedings, Vol. 1, pp. 7 – 11, 2004.

[4]C. T. Li, “Digital fragile watermarking scheme for authentication of jpeg images,” IEE Proc.-Vis. Image Signal Process., Vol. 151, pp. 460 – 466, 2004.

[5]C. Y. Lin and S. F. Chang, “A robust image authentication method distinguishing jpeg compression from malicious manipulation,” Circuits and Systems for Video Technology, IEEE Transactions on, Vol.11, pp.153–168, 2001.

[6]E. Kougianos, S. P. Mohanty, and R. N. Mahapatra, “Hardware assisted watermarking for multimedia,” Computers Electrical Engineering, Vol.35, pp. 339 – 358, 2009.

[7]A. Brunton and J. Y. Zhao, “Real-time video watermarking on programmable graphics hardware,” In Electrical and Computer Engineering, 2005. Canadian Conference on, pp. 1312 – 1315, 2005.

[8]S. P. Mohanty, N. Pati, and E. Kougianos, “A watermarking co-processor for new generation graphics processing units,” In Consumer Electronics, 2007. Digest of Technical Papers. International Conference on, pp. 1– 2, 2007.

[9]NVIDIA Corporation, “NVIDIA CUDA Programming Guide_Version1.1,”http://developer.download.nvidia.com/compute/cuda/1_1/NVIDIA_CUDA_Prog  ramming_Guide1 1.pdf, 2007.

[10]H. Kourkchi and S. Ghaemmaghami, “Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack,” Advanced Communication Technology, 2009. 11th International Conference on, Vol. 03, pp. 1928-1932, 2009

[11]C. Y. Lin and S. F. Chang, “Sari: self-authentication-and recovery image watermarking system,” in MULTIMEDIA ’01: Proceedings of the ninth ACM international conference on Multimedia, pp. 628 – 629, 2001.

[12]A. Obukhov and A. Kharlamov, “Discrete Cosine Transform for 8x8 Blocks with CUDA,” NVIDIA white paper, 2008.

[13]C. H. Lin, T. S. Su and W. S. Hsieh, “Semi-Fragile Watermarking Scheme for Authentication of JPEG Images,” Tamkang Journal of Science and Engineering, Vol. 10(1), pp. 57–66, 2007.

[14]S. P. Mohanty, E. Kougianos and N. Ranganathan, “VLSI architecture and chip for combined invisible robust and fragile watermarking,” Computers Digital Techniques, IET, Vol. 1(5), pp. 600–611, 2007.

[15]Y. H. Seo and D.W. Kim, “Real-time blind watermarking algorithm and its hardware implementation for motion JPEG2000 image codec,” In Proceedings of the 1st workshop on embedded systems for real-time multimedia, pp. 88–93, 2003

[16]S. Lahabar, P. J. Narayanan, “Singular value decomposition on GPU using CUDA,” IEEE International Symposium on Parallel & Distributed Processing, pp. 1-10, 2009.

[17]S. H. Yoo, J. H. Park, C. S. Jeong, “Accelerating Multi-scale Image Fusion Algorithms Using CUDA,” International Conference of Soft Computing and Pattern Recognition, SOCPAR '09, pp. 278-282, 2009.

[18]S. Chen, J. Qin, Y. M. Xie, W. M. Pang, P. A. Heng, “CUDA-based acceleration and algorithm refinement for volume image registration,” International Conference on Future Biomedical Information Engineering, FBIE 2009, pp. 544-547, 2009.

[19]S. Datla, N. S. Gidijala, “Parallelizing Motion JPEG 2000 with CUDA,” Computer and Electrical Engineering, ICCEE '09. Second International Conference on, pp. 630-634, 2009.